CVE-2011-1154
Published: 30 March 2011
The shred_file function in logrotate.c in logrotate 3.7.9 and earlier might allow context-dependent attackers to execute arbitrary commands via shell metacharacters in a log filename, as demonstrated by a filename that is automatically constructed on the basis of a hostname or virtual machine name.
Notes
Author | Note |
---|---|
mdeslaur | issue #6 shred option was introduced in logrotate 3.7.5 |
Priority
Status
Package | Release | Status |
---|---|---|
logrotate Launchpad, Ubuntu, Debian |
dapper |
Not vulnerable
(code not present)
|
hardy |
Not vulnerable
(code not present)
|
|
karmic |
Ignored
(end of life)
|
|
lucid |
Released
(3.7.8-4ubuntu2.2)
|
|
maverick |
Released
(3.7.8-6ubuntu1.1)
|
|
natty |
Released
(3.7.8-6ubuntu3.1)
|
|
upstream |
Needs triage
|
|
Patches: upstream: https://fedorahosted.org/logrotate/changeset/311 upstream: https://fedorahosted.org/logrotate/changeset/313 |